Thursday, September 3, 2020

Sibling Relations and Subsequent Characteristic Traits

Kin Relations and Subsequent Characteristic Traits The loss of guardians effectsly affects the lives of the kids. Out of nowhere, the kids need to figure out how to exist without the solace and feeling of consolation that guardians will in general provide for their youngsters †regardless of whether youthful or old.Advertising We will compose a custom exploration paper test on Sibling Relations and Subsequent Characteristic Traits explicitly for you for just $16.05 $11/page Learn More The nonappearance of guardians causes the kids to identify with one another in an alternate way. Much of the time, the senior kin will in general take up the parental job; nonetheless, ill-equipped they are, and the ensuing relations between the senior and more youthful kin frequently draw out certain character characteristics and characteristics in them as people. The connection between kin whose guardians are missing because of death or different elements and the resulting life battles the kin suffer, every now and again draw out specific characte ristics and qualities in them. For the most part, the senior kin build up a capable, intense, and unselfish character, while the more youthful kin regularly become reliant and reckless; all kin, be that as it may, obtain conciliatory characteristics at long last. Without guardians because of death or different components, senior kin routinely need to step in and assume the parental job, making these senior kin become capable and centered people. Definitely, numerous senior kin are out of nowhere confronted with the obligation of dealing with their more youthful kin, filling in the void left by the missing guardians. A considerable lot of the activities of the senior kin are equipped towards giving a feeling of passionate and situational balance for the more youthful kin, who are all the more vigorously influenced by the nonattendance of the guardians (Dunn 788). By and large, the senior kin, therefore, become exceptionally mindful and centered people. In the occurrence where the age hole between the oldest kin and the more youthful one(s) is noteworthy, the senior kin frequently turns into an authentic parent to the more youthful kin. In the event that the oldest kin is associated with any pay procuring action, the person in question will be the provider for the more youthful kin true to form, and should suit the necessities of the more youthful kin in all the plans the person makes. Out of the connection between the senior kin and the more youthful kin, wherein the senior kin needs to assume the ‘parent’ job, a sharp awareness of other's expectations creates in the senior kin. The senior kin, paying little mind to age, needs to turn into the watchman to the more youthful kin, and such an obligation makes a capable character in the senior siblings.Advertising Looking for research paper on brain science? We should check whether we can support you! Get your first paper with 15% OFF Learn More The senior kin regularly need to persevere through more d ifficulties and need to relinquish their own recreation, opportunity, and sentiments of hurt and surrender from the nonattendance of guardians for the more youthful kin. The senior kin in this manner become intense and genuinely vacant because of this. Since the torment from parental misfortune is unpredictable, it influences, damages, and leaves the more seasoned kin frightened and surrendered in a similar way it does the more youthful kin. Notwithstanding, the more seasoned kin are not allowed the chance to lament or express these feelings since they promptly need to fill in the physical and enthusiastic hole left in the family because of the demise of guardians. Since the senior kin must be genuinely solid for the more youthful kin, they ideal the craft of concealing their emotions. In addition, given that the senior kin are required to be the good example and a wellspring of asylum for the more youthful kin when life for these more youthful kin gets somewhat intense, the senior kin don't get an opportunity to ‘wear their hearts on their sleeves’. In any event, when the event requires a touch of passionate expressiveness, the senior kin will as often as possible will in general pretend a feeling of lack of concern to the circumstance, with the goal that the more youthful kin can find the opportunity to vent their outrage and express their feelings. As indicated by Schlomer et al, at whatever point the family is in an emergency, the kin go to one another for enthusiastic support†¦crises like separation, parental division, terminal sicknesses in a parent, or demise of a parent push the kin to go to one another (290). On the off chance that the kin age distinction is significant, the senior kin must be sincerely equipped for the more youthful sibling(s). Accordingly, by and large, the senior kin don't normally get the individual chance to communicate their sentiments, and in this way become genuinely vacant and think that its harder to commun icate their emotions openly. Also, more youthful kin are probably going to misuse the bountiful generosity appeared to them by their senior kin, in this manner creating lighthearted perspectives and developing a culture of being flippant. The advantages of having solid kin relations, notwithstanding, will in general be abused by the more youthful kin now and again. As indicated by Kramer and Conger, displaying isn't the main way that more youthful kin gain from their senior kin. Despite the fact that more youthful kin will in general undertaking to copy the conduct of the senior kin, the opposite is likewise obvious (4). The impact of friends on the more youthful kin will in general be more grounded than that of the model senior kin. Along these lines, if the more youthful kin doesn't impart common companions to the senior kin, at that point the impact of the more youthful sibling’s companions supersedes that of the senior kin in most cases.Advertising We will compose a custo m examination paper test on Sibling Relations and Subsequent Characteristic Traits explicitly for you for just $16.05 $11/page Learn More Subsequently, as the dependable senior kin attempt to make the life of the more youthful kin better, the more youthful kin once in a while exploit and endeavor this graciousness for their own childish closures. Kramer and Conger, for example, express that the more youthful kin are bound to drop out of school because of early pregnancies or substance misuse while living together with the senior kin. Besides, when the senior kin sets norms throughout everyday life and instructive accomplishment that the more youthful kin may discover difficult to imitate, the more youthful kin channels these disappointments into self-destructive propensities, for example, medicate manhandle and turn out to be increasingly helpless to negative companion impact (6). Subsequently, the more youthful kin build up an indiscreet way to deal with life issues and become untr ustworthy. Senior kin, for their more youthful kin, frequently plan their individual lives to fit to the necessities of their more youthful kin. The senior kin in this way create unselfish attributes. The relationship among kin includes numerous elements. There is an immediate connection between how the more youthful kin inevitably settles on their life decisions in adulthood. Such relationship likewise exists in the impact of the senior kin on the more youthful sibling’s life. Gerbert expresses that, when the senior kin is strong of the more youthful sibling(s), the more youthful kin end up being more capable than a youngster who doesn't get the enthusiastic, social, and material help of a senior kin (1389). Such a positive impact by the senior kin demonstrates an unselfish trademark. As a rule, difficulties persevered through together reinforce the connection between kin; they are progressively changed in accordance with life’s normal difficulties, and such kin can f orfeit their individual wants, dreams, and trusts in the purpose of their kin. These kin subsequently commonly create conciliatory perspectives and characters. The loss of guardians, particularly in youth leaves the kin little choice however to draw quality from one another as they grow up. As per Mack, kin who lose their folks when they are youthful will in general have more grounded grown-up connections than kin who lose their folks as grown-ups (145).Advertising Searching for research paper on brain science? We should check whether we can support you! Get your first paper with 15% OFF Find out More As they become more established, these kin figure out how to draw quality and motivation from one another, and the acknowledgment that they have just each other for help braces these connections. For example, the mutual battles between the two siblings, the storyteller and Sonny, in the long run reinforce their relationship. Having defeated their underlying relations, the two siblings in â€Å"Sonny’s Blues† get the chance to value each other’s select dreams and wants throughout everyday life. Subsequently, the loss of guardians has the impact of reinforcing kin relations generally speaking, particularly if the misfortune happens when the kids are youthful. These kin, much of the time, are in this manner capable and ready to forfeit for one another and consequently procure a conciliatory character particularly towards one another and those near them. In Conclusion, how kin identify with one another, particularly without guardians, capacities to draw out specific qualities and characters in the kin as a rule. The abrupt flight of a parent from the family scene significantly affects the prompt and future prosperity of the youngsters. More often than not, the youngsters need to make enthusiastic, good, social and even monetary re-changes in accordance with their lives. All these re-alterations make the kin go to one another for help and consolation and such a relationship draws out specific characteristics in the kin. The senior kin will in general be mindful, sincerely develop, and philanthropic, while the more youthful kin will in general be untrustworthy. Them two in the end do build up a common regard and love for one another, in view of shared troublesome educational encounters as kin whose guardians are missing. Dunn, Judy. Kin Relationshi

Saturday, August 22, 2020

Critically Analyse the Role and Value of 'The Community' in Global Essay

Basically Analyze the Role and Value of 'The Community' in Global Justice Theory - Essay Example A cutting edge case of how the world has revitalized for social great is utilized to place the contribution of the worldwide network in the subject being talked about into point of view. A case of â€Å"the undetectable children†, an association that delivered the â€Å"Kony 2012† film that as of late became famous online for social great is utilized for this situation. Presentation Social equity, is characterized as the reasonable and suitable execution of laws in accordance with the regular law to all individuals paying little mind to their ethnicity, sex, riches status, race, strict convictions, political affiliations, etc with fairness and without separation. Social equity starts with the obtaining of social equality, characterized as the benefits related with citizenship of a specific nation. These incorporate the privilege to opportunity, appropriate administration, equity and reasonableness in the execution of the traditions that must be adhered to along with hum an and characteristic rights like the benefit to hold open office subject to an individual’s direct (Kuper, 2000)1. From the definition, social equity starts at the neighborhood network level to the degree of a nation before going worldwide. Worldwide social equity can't thusly be accomplished if singular nations have not made space for its realization. A more profound significance of worldwide social equity To have a top to bottom comprehension of worldwide social equity, the accompanying four regions must be appropriately clarified; equivalent citizenship, privilege to a social least, uniformity of chances and reasonable dissemination of assets. With an appropriate valuation for these issues, the social equity in a worldwide setting will be unmistakably figured it out. As per Simon Maxwell (2008)2, in his distribution to the Overseas Development Institute (ODI), the over four territories have the accompanying importance: Equal citizenship. This isn't simply being an occupan t of a specific country and acquiring a living inside the bounds of the country’s fringes, yet has an a lot more extensive imperative of opportunity, uniformity and solidarity communicated by residents of a nation and by an augmentation the world. The voice of a resident must be heard and they ought to be in a situation to consider open organizations responsible to be viewed as full recipients of social equity. Assurance of social least. This has the ramifications of interests in social security to guarantee that all the common freedoms so accomplished are not surrendered yet rather extended to cover territories that are yet to encounter social equity. It subsequently requires watchfulness with respect to residents to guarantee that all accomplishments with respects social equity are appropriately shielded from malevolent intrigue bunches looking to take any additions from a country’s residents. Correspondence of chances This arrangements with the opportunity to receiv e the rewards of financial, social and social additions. Individuals from a nation or society must have equivalent access to gains chances to training, wellbeing and reasonable organization of equity with the alternative of holding anybody endeavoring to deny these chances to account. A general public that benefits equivalent opportunities to its individuals is in this way considered to have given social equity to its constituents. Reasonable appropriation The social equity motivation if confronting issues on account of the issue of circulation. This is one theme once in a while talked about in many circles since it addresses the tip top. America is considered on the countries

Friday, August 21, 2020

The Caste System- Reaction Response Essay Example

The Caste System-Reaction Response Paper This division in Indian culture has existed since days of yore . This Verna System is the Caste System that is as yet predominant n the nation . It classifies the work to be finished by every This framework is predominant to a great extent among Hindus , yet exists among different strict networks in India too . Brahmins are viewed as the most noteworthy position . They are overwhelmingly vegans , who are appointed job of ministers , educators or researchers . They appreciate numerous advantages . Offspring of these families are relied upon to Join family calling . Ashtrays were lords and warriors in days of yore , directly they are In diverse callings . Visas , remained brokers from the earliest starting point of this Verna dolls , and are soul Into exchanging . The fourth are the Shudders , who make the serving class In Indian culture The Shudders are the fourth and most ignored standing in India . They are otherwise called Dalais (the down trodden ) and named Harridans (individuals having a place with god ) by Mahatma Gandhi . They have a troublesome existence , without instruction and are not permitted to change occupation . The work allocated to them is regularly unhygienic , polluting and undesirable . They are not permitted to enter sanctuaries and love . Indeed, even essential courtesies like assortment of drinking water must be from wells or taps which are not utilized by individuals from higher positions like Brahmins There re divisions in Dalai society too . The Ana (Barber , Dhobi (Washer man ) stand higher than Chamber (Cobbler ) or Bang (Sweeper . They are not permitted section to places in the town where individuals of higher ranks live . We will compose a custom paper test on The Caste System-Reaction Response explicitly for you for just $16.38 $13.9/page Request now We will compose a custom exposition test on The Caste System-Reaction Response explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer We will compose a custom paper test on The Caste System-Reaction Response explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer In this way they live a hard and brutal life The Modern culture lives with these separations and utilize uncommon terms for these individuals . They are called Scheduled Castes (SC , Scheduled clans (SST ) or Other Backward Classes (BBC . The SC is 16 of the populace making it 160 million . SST is 8 at million and BBC is 52 with 3000 ranks . The station framework has taken the current arm after the British assumed control over the standard of India , in accordance with the class arrangement of British society The rank framework is some what loose in urban and metropolitan territories Inter-position relationships are likewise regular . In organized relationships , standing of the lady of the hour and the lucky man are cross registered and taken with thought It is because of impact of advanced education that these regions are liberated from station inflexibility . Be that as it may, country territories despite everything reel under its impact Political gatherings and pioneers regularly accept position as an issue , to make it delicate to meet their finishes . The BSP (Bauhaus Assam Party , Swampland Party , Kanata Deal are a couple of ideological groups that spoiled the position slants and prevailing With regards to winning the decisions . Reservations in instruction and governmental issues have been made by these toxins prompting wide spread fights and commotion . Amanda Commission suggested by ex-P . M . Mr. . V - P - Sings attempted to Implement ten suggestions Ana Take small spread Protests It NAS seen many taught young men and young ladies endure because of these booking strategies . India has seen is as yet confronting numerous rank related brutality . Such huge numbers of have lost their lives in this viciousness . It has chiefly been between upper positions like Thesaurus and Dalais of lower standing Indian Caste System has been under the scanner of analysis since history . The reformers of Indian culture in the past have denounced the standing framework . Nanas , Kabuki , Djakarta , Ramadan , Ramadan the holy people of Backbit clique dismissed station separation . Later during Struggle for Freedom in mid nineteenth century , Indian government officials denounced position differentiations . Strict pioneers Swami Dandy , Swami Vegetarians , Sir Ramekins and government officials Mahatma Gandhi , B . R . Left remained against this segregating framework . They were available to individuals from all standings B . R . Set out himself from a group of planned station turned into the author of Indian Constitution in Independent India The Indian Caste framework displays a couple of solid focuses . It helped in holding privately-run company , craftsmanship and craftsmans who have been examining a workmanship for ages . It made the endurance of specific types of craftsmanship conceivable . However the oddities and burdens out of sight the points of interest . The requirement for standing framework is bit by bit moving out . The youthful India , which is anxious to get training and use innovation for its flourishing , wouldn't like to grasp satiate contrasts . The informed class living in urban India firmly advocates getting rid of station hindrances . Be that as it may, under instructed and ignorant rustic masses despite everything clutch the conviction of division as an approach , which is advantageous to their inclinations . Maybe training for the majority is the thing that India needs today to shake off such old frameworks . It is never prudent that a piece of the general public be permitted to carry on with an actual existence that is horribly unique in relation to the lives of others on this globe Read more: http://www. Nightdresses. Com/article/standing. Framework. Exposition. 51655#txzz2PSk4zd8S

Tuesday, June 9, 2020

New Approach Of IT - Free Essay Example

1. INTRODUCTION 1.1 Background and Motivation The new epoch of information and technology has begun. The use of the internet is transforming how business is done locally and globally. Due to major technical developments, the internal information system development is moving to an external development and provision model, driven by the needs for lower costs, faster implementation, easier-to-use applications and effective use of scarce resources (Locket et al., 2006). The internet has revolutionised the computer and communication world like nothing before. The invention of the internet has a worldwide broadcasting capability, it is a medium of collaboration and interaction between individuals and their computers without any limitation in their geographical location. The origin of the internet can be found in the United States department of defences Advanced Research Project Agency (ARPA). The aim of the ARPA was to develop a nationwide computer system where military personnel could share message without any barrier irrespective of their location (Freedom, 2008). In 1960s United States funded researchers in California to explore ways through which computers could share information. In 1969, the research group connected the computers of some universities in the United States to share information being physically apart. The network was named as ARPA network or ARPAnet (Freedom, 2008). The last few years have witnessed technological changes among which prominent is electronic commerce, or the exchange of products (tangible and otherwise) and payments via telecommunication systems (Kalakota Whinston, 1997). Payment systems are a core group of strategic information system which contribute towards economic development, especially in emerging economies, and forms the foundation for financial sector. Most of the industries have been influenced in some way or the other by e-commerce, nowhere the effect of e-commerce is more apparent in online banking (e Marketer, 2000). The online banking overcomes the traditional banking and its way of queuing up to get the transaction done. Internet banking is no more taking out time from the schedule to go to the bank, it is the easiest and the safest way of banking. An individual can get reports about the account, statement etc. with just click of a button (Online banking question, 2008). Apart from ease of use there are some barrie rs in online banking. The main issue is that of trust. Customers may wonder if their transaction went through successfully or the clicked the correct button. Also online banking can take some time to start and can be difficult to learn at first for the beginners. Thus, the physical separation of the bank with the customers and that of the customer with the financial advisor, the overall perceived insecurity of the internet provides unique challenge to the bank to develop a safer internet banking (Mukherjee, ) The internet technology are rapidly changing the personal financial services are being delivered. Several banks in India have introduced internet banking to make the banking faster, easier and to reduce the costs. Despite such developments by the banks these facilities are largely unnoticed by the customers. Online banking is the newest channel for retail banking services. Online banking refers to several types of services in which the customer can carry out most of the services balance reporting, inter-account transfer and bill payment (Sathe, 1999). Europe has been the leader in online banking technology (Schneider, 2001). At the end of 2000 only 20 percent of the United States banks offered online banking ad only 20 percent of the customers with internet connection used online banking. In Europe 75 million users used online banking by 2005. Most popular Online banking Activities Most Popular Internet Activities 2005 Visitor Activities 1. E-mail 2. General web surfing/ browsing 3. Reading news 4. Shopping/ buying goods online 5. Entertainment news 6. Looking for and reading information about hobbies 7. Online banking 8. Looking for and reading medical information 9. Instant messaging 10. Looking for and reading travel information and making travel arrangements Table: Most popular internet activities in 2005 Source: U.S.C. Annenberg School Center for Digital Future, 2005 cited in Laudon and Traver, 2007, p.220) However, one of the major concerns regarding not using the internet has been highlighted by many authors and that issue is security. Chesher and Kaura (1998) points that the most important reason that has kept both consumers and business away from the internet is its security issue. Security is considered as the primary issue than any other issue. Nevertheless, efforts have been made to overcome this issue in the form of software, digital certificate, signed message, encrypted message and so on (Chesher ad Kaura, 1998 M) As the organisation continue to invest in ICT, the usage behaviour of the consumer becomes very important topic in research on its implementation. To understand the usage behaviour of the consumers we will use technology Acceptance Model (TAM), this is an established model of computer usage and has been validated through testing with a number of technologies. From the Asian market experience, it is clear that internet banking is here to stay and would be major way to acquire and provide service to the customers. The banks that have launched online banking products and services increased from 6% in 1998 to 75% in 2003. According to IDC, in countries like Korea and Singapore 10% of their population uses internet banking. These markets are way ahead of India both in terms of online banking penetration and internet penetration. India is a big potential market and is fast catching up with its counterpart (Kannaberan, Narayan, 2005). Despite all the efforts and investment undertaken by the banks, e-banking facilities have been unnoticed by the customers of India. Therefore, customers perception and trust is of utmost importance. The Indian market has been increasingly attractive for global marketers in the recent years. Although the overall per capita GDP (Gross Domestic Product) is low at $421 (Budhwar, 2001). There are 203 million middle class consumers who are well educated and with salaries more than $5000 in local purchasing power (Ramchandaran, 2000). As a result FDI (Foreign Direct Investment) flow to India increased from $103 million in 1990-91 to $5.1 billion in 2000-01. 1.2 Aims and Objective: The aim of the study is to determine the importance of trust in relation to the online banking. This will lead to explore a range of issues related to trust, security and how well Indian banks adopted online banking. This research also aims to investigate the internet adoption strategy in established banks. The research problem chosen of a great importance especially in developing country like India where banking sector witnessed a major revival in the last decade. The research question is important because the entire multinational bank that came to India tried to persuade people to use online banking but still people dont use it because they dont trust online banking. The research will basically deal with customers trust in online banking and factors that affect it. This is one of the major areas where the bank should concentrate and work upon it. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. In spite of the recent boom in electronic commerce, customers are reluctant to provide sensitive information to websites. Generally the customers are comfortable in providing general information but they are uncomfortable in providing sensitive information like credit card details, personal details. Internet banking sites are one location where most personal information is carried out, that is, financial information. This inhibits the usage of internet banking by customer. Therefore unlike traditional information system, the perceived usefulness and perceived ease of use may not fully reflect customers acceptance of internet banking. Research on customers acceptance of internet banking may therefore enhance the understanding of a customers belief to use internet banking. TAM is an established model of computer usage and has been validated through testing with a number of technologies (Davis et al., 1989; Igbaria et al., 1994, Lederer et al., 1998). And it has also been found that TA Ms ability to explain attitude towards using an Information System is better than other models like Theory of Reasoned Action, Theory of Planned Behaviour (Mathieson, 1991 (CP)). The studies have proved that TAM explains around 40% of the variance in the usage extension ad behaviour. We will use Technology Acceptance Model (TAM) as a base model for this research, and adjust the model to reflect the characteristic of Internet banking and Trust. 2. Literature Review 2.1 Introduction to ICT The world is it the midst of general purpose technology revolution. Information and communication technology has developed in the context of rapidly changing business environment. For several years, there have been talks about topics like new global political and economic orders, liberalization of trade, growing environment concerns, deregulations, rapid technological developments especially information and communication technology and terrorists attack and so on. For business perspective only few are driving forces while others are just facilitating or inhibiting factors (Li, 2007 M). Two changes that have contributed to the current transformation are the changing nature of the economy and rapid development and proliferation of the ICTs. ICT in general and internet in particular are changing the way businesses are done all over the world. The internet is a source of data and information and its value depends on the provider, its relevance timeliness and accuracy (Lany and Powell, 2003 M). The internet has created new communication channel that is bringing people together cheaply, efficiently and presenting many opportunities and challenges for the business community. People around the world are using the internet to service their need and wants and thus the internet is presently the potential for extending markets, developing new products, services and achieving profitability (Combe, 2006). Due to this the worldwide number of internet users has increased from record 16 million in 1995 to 1.5 billion in 2008 (Internet worldwide stats, 2009). The ICT revolution has already led to some profound changes and many more yet to come. The internet is particularly important as it is acting as a contemporary platform on which m any of the new important developments are taking place. 2.2 Internet Banking and India Internet banking has witnessed wide acceptance internationally and catching up fast in India with more and more banks entering into fray. The British legacy left behind large and small privately held banks. In the late 60s all the private banks were nationalised, which led to the emergence of the public sector banks. In 1960s banks used latest technologies in massive way, led in particularly by new private or Multinational Banks. In the context of online banking private banks have been early adopters whereas public banks are lagging behind. Reserve Bank of Indias survey in 2001 revealed that 46 major banks operating in India, around 50% of them either offered internet banking services or planned to offer in the near future. Only 1% of the internet users utilised internet banking services in 1998, the internet banking user base increased by 16.7% by 2000 (Icmrindia,). Major Banks like ICICI bank, HDFC bank, IDBI, Bank of Punjab etc were offering online banking services. The banks began to collaborate with utility companies to provide online services to the customers. ICICI bank collaborated with Infinity, which was already a leader in online banking in India to pay their online bills. HDFC through payment gateway allowed its customers to make online payments. As more banks entered into online banking fray, the competition between the banks deepened. This forced the banks to search for new market, customers and adopt new technology. Multinational and private banks have been very successful in India in setting up internet banking, this is because they already had automated banking environment. Most of the multinational banks have already have internet banking in other countries that can be copied in India. Unfortunately nationalised banks or public sector banks have been unable to evolve as fast as private banks because in many organisations there may be a mix of both automated and manual system, both the system runs parallel created by the small vendors. This creates chaos and makes network management a nightmare. ICICI Bank started banking way back in 1996 and other banks soon followed it. During 1995-99 ICICI Bank invested Rupees 50 million in online banking technology solutions. Year 1996 to 1998 marked the adoption phase because of the increased usage of internet in 1999 due to the lower internet service provider charges. The industry estimates the cost of internet banking at Re. 0.10 per transaction whereas the charges of other conventional methods such as ATM at Re. 0.45 per transaction, phone banking at Re. 0.35 per transaction. Thus, this shows that internet banking is more cost effective. State Bank of India (SBI), which is one of the oldest bank of India launched internet banking in July 2001 and it has 18,000 registered customers across 150 branches. Some of the reason why public sector banks are lethargic because there is a lack of zeal and mindset towards adopting new technology , second reason is the highly politicised unions which act as a barrier as they feel that internet bank ing will expose their low productive levels. The list of the Indian banks includes: Name URL 1. Allahabad Bank https://www.allahabadbank.com/ 2. Andra Bank https:// www.andrabank.in/ 3. Axis Bank Ltd. https:// www.axisbank.com/ 4. Bank of Baroda https:// www.bankof baroda.com/ 5. Bank of India https:// www.bankofindia.com/ 6. Bank of Maharashtra https:// www.bankofmaharashtra.in/ 7. Canara Bank https:// www.canarabank.in/ 8. Central bank of India https:// www.centralbankofindia.co.in/ 9. City Union Bank Ltd. https:// www.cityunionbank.com/ 10. Corporation Bank https:// www.corpbank.com/ 11. Dena Bank https:// www.denabank.com/ 12. Development Credit Bank Ltd. https:// www.dcbl.com/ 13. HDFC bank Ltd. https:// www.hdfcbank.com/ 14. IDBI Ltd https:// www.idbi.com/ 15. Indian Bank https:// www.indian-bank.com/ 16. Indian Overseas Bank https:// www.iob.in/ 17. Indusind Bank Ltd. https:// www.indusind.com/ 18. Ing Vysya Bank Ltd. https:// www.ingvysyabank.com/ 19. Kotan Mahindra Bank Ltd. https:// www.kotak.com/ 20. Nainital Bank Ltd. https:// www.nainitalbank.co.in/ 21. Oriental Bank of Commerce https://www.obcindia.co.in/ 22. Punjab National Bank https://www.pnbindia.com/ 23. Punjab Sindh Bank https://www.psbindia.com/ 24. SBI Commercial and International Bank Ltd. https://www.sbici.com/ 25. State Bank of Bikaner Jaipur https://www.sbbjbank.com/ 26. State Bank of Hydrabad https://www.sbhyd.com/ 27. State Bank of Indore https://www.indorebank.org/ 28. State Bank of Mysore https://www.mysorebank.com/ 29. State Bank of Patiala https://www.sbp.co.in/ 30. State Bank of Travancore https://www.statebankoftravancore.com/ 31. Syndicate Bank https://www.syndicatebank.in/ 32. Tamilnad Mercantile Bank https://www.tmb.in/ 33. The Bank of Rajasthan Ltd. https://www.bankofrajasthan.in/ 34. The Catholic Syrian Bank Ltd. https://www.csb.co.in/ 35. The Dhanalakshmi Bank Ltd. https://www.dhanbank.com/ 36. The Jammu Kashmir Bank Ltd. https://www.jkbank.net/ 37. The Karnataka Bank Ltd. https://www.karnatakabank.com/ 38. Karur Vysya Bank Ltd. https://www.kvb.co.in/ 39. The Lakshmi Vilas Bank Ltd. https://www.ivbank.com/ 40. The Ratnakar Bank Ltd. https://www.theratnakarbank.com/ 41. The Sangli Bank Ltd. https://www.icicibank.com/pfsuser/icicibank/ibank-nri/nrinewversion/listofm2i_sanglibankltd.htm 42. The South Indian Bank Ltd. https://www.southindianbank.com/ 43. The United Western Bank Ltd. https://www.uwbankindian.com/ 44. UCO Bank https://www.ucobank.com/ 45. Union Bank of India https://www.unionbankofindia.co.in/ 46. United Bank Of India https://www.unitedbankofindia.com/ 47. Vijaya Bank https://www.vijayabank.com/ 48. Yes Bank https://www.yesbank.in/ (Financial Technologies, 2009) The services offered by the banks on the internet are: 1. Information Kiosks: In this the bank provides information about various products and services offered by the banks. The bank solves the queries of the customers through emails. 2. Basic Internet banking: In this the banks allows the customers to open the account and pay bills. 3. E-Commerce banking: Banks acts as an e-market place and enables the customers to transfer the money from their account, bill payment, sale and purchase of securities etc. The Wallis report (1997) stated that consumers will use those financial products and suppliers which offer best value for money and they are educated about it. Hence, in case of adoption of internet banking, it is necessary that bank should make consumers aware about availability of the product and how it adds value to the products. The perceived usefulness and in electronic banking according to Trethowan and silicone (Daniel, 1999) was sales orientation, convenience and low costs. The importance of perceived usefulness has been recognised in the field of internet banking (Gwiting, Ndubisi, 2006; Ericson et al, 2005; Polatoglu and ekin, 2001). According to them usefulness is probability that technology can improve how user completes a task. However, Gerrard and Cunningham (2003) stated that perceived usefulness depend upon the services offered like checking bank balance, applying for a loan, paying bills, transferring money abroad and obtaining information on mutual funds. The greate r the perceived usefulness of electronic banking services, the more electronic banking will be adopted. Threats to information security and fraud related to electronic transaction have increased at an alarming rate, resulting in reduced trust in transactions online (The Hindu, 2009). In online banking in India not many fraud activities have taken place. But in internet banking one cannot depend heavily on luck. No institution or bank can afford to depend on luck. The institutions have to adopt security procedures to suit the environment, in order to increase the trust ad faith in the user of online banking. Trust in online banking is new and emerging field of internet in management research. Literatures on online banking are focussed more on general (main). For example Khiaonarong (2000) examined electric payment system and discussed laws supporting electric payment system, risk reduction method. Tan and Teo (2000) explored intentions to use internet banking services through attitude subjective norms and behavioural controls. Daniel (1999) examined online banking issues like culture of innovations, market share and organizational restrictions. Mole (1998) examined behavioural issues pertaining to online banking, such as satisfaction, price sensitivity. Sathye (1999) studied the effect of security, ease of use, awareness and pricing. Trust has been defined in various ways. Trust is willingness to rely on an average partner in whom one has confidence (Moorman et. al ., 1993). Morgan and Hunt (1994) felt trust exists When one party has confidence in an exchange partners reliability and integrity. Mc.Knight and Chervany classifies the definition of trust in four types: deposition of trust, institution-based trust, trusting belief and trusting intention. Deposition of trust means the extent to which one displays consistent willingness to be dependent in general in any situation. This is primarily derived from psychology. Institution-based trust means that one believes that conditions conducive to situational success in an endeavour or aspect of ones life are in place. This type of trust is derived from sociology. Trusting belief is one where one beliefs that the other party has one or more characteristic beneficial to oneself. Trusting intention means that one is willing to depend on the other party even though one c annot control that party. Thrusting belief and trusting intention are primarily derived from social psychology. Husted (1989) states that the trust is a complicated construct because of wide spectrum of approaches that defines it, makes it difficult to define ad operationalise. Trust can be defined in three perspectives Cognitive, economic and social. A cognitive definition of trust represents an optimistic expectation for an outcome of an event. To be specific it is a confidence I the result of an uncertain event. Zand (1972) defines trust as it is a positive expectation about the outcome, with a lack of control over the actions of others. The transaction-cost theory of trust states that a potential trustor examines the cost and benefits inherent in trusting abother party. The cost of trust is examined because the trustee may ivolve opportunistic or detrimental behaviour to maximise self interest (RBSir). The social perspective states that the trust can arise irrespective of economic consideration. When a number of people share common values, beliefs are known as reference groups. This helps in building trust in the group. Howard (1994) states that the group has a strong influence on individuals beliefs and their valuation of products and services. The question of trust may be even more important in online banking environment than in offline banking environment. Because building trust is particularly important where there are risk and uncertainty. In the internet environment all the users are spread around the world that access critical files on computers and information via internet. Therefore, internet becomes risky from the view point of security because parties involved in the transaction that is customer and the bank are not at the same place. Customers cannot depend on physical activity, handshakes and body signals because the customer cannot see the teller. Because of this, customer trust is of major factor enhancing the growth of internet banking (Shu, Han). The growth of online e-commerce activity has encouraged a lot of research on user trust in online environment. Researchers in this area have generally used institutional trust developed by Zuker (1986). Institutional trust refers to the development of trust within a n economic framework and using third party mechanism such as certification ad regulation to establish trust. 2.3 Dimensions and antecedents of Trust Now we will discuss about trust and its dimensions, antecedents and consequences. The dimensions of the trust are: 1. Reputation 2. Perceived Risk Reputation: Reputation is one of the dimensions of trust. Reputation is defined as Overall quality character as seen or judged by people in general (Malaga, 2001). When customers uses online banking they would have banks reputation in mind. Reputation is very important for trust worthiness. The more the reputation of the bank the more it will encourage people to do online transactions. And if the people think that a bank has a poor reputation, then they will be discouraged to use online banking. Reputation arises from a particular brand name, previous interaction, endorsement from trusted third parties (Egger, 2000). Perceived Risk: Perceived risk is a key dimension of trust. The issue of trust arises as the bank and the customers are physically apart, difficulty in predicting problems, relationships are difficult to maintain and also the cyber laws are not well defined (main). The issue of trust also arises because economic transactions involve risk (main). Experienced online banking users have more information about online banking, thus leading to less risk and more trust in online transactions (Ba, 2001). The extent to which they trust the electronic system is likely to co-relate with trust when engaging in online banking (lee, Turban, 2001). When customers assess their trust certain issue that arises in their mind are competency of electronic system, network and download speed, reliability, connectivity and availability (Lee and Turban, 2001). The main issue to the customers would be reliability of the network because when customer transfers important financial data over the network there are provision that unauthorised parties ca intercept the transfer of information. Antecedents of Trust 1. Shared Value 2. Communication 3. Opportunistic Behavior Shared Value: Extent to which both the partners have common belief about goals, policy and behaviours whether they are wrong or right important or unimportant (main). In online banking environment shared value means extent to which they have common beliefs on ethics, security and privacy. Ethical value means chances of being given incomplete or wrong product information and selling customers information to the third party. Honesty and Ethics help build trust (Huemer, 1998, main). A number of surveys have found high level of customers concern about privacy in online banking (Ackerman et al., 1999, main). The main concern for customers is privacy violation which means misusing personal information of the customers. Due to technical development and low cost of data transmission, now it had become easier for companies collect data from the customers and sharing it with the third party (Clay and Strauss, 2000). Security is one of the most important factors in building trust. Customers believe that internet payment channel are not secure and can be intercepted, this reduces customers trust in online banking and discourages them in using it (main). However, recent development in the internet environment has made the customers less concerned about internet security (Swaminathan et al., 1999). Communication: Communication can be defined as sharing of formal as well as informal and timely information (Anderson and Narus, 1990). The variables of the communication are openness, speed of response and quality of information. Trust is build by openness in communication and their relationship with the bank. Geten and Straub (2001) research found that electronic system plays an important role in building trust with the customers. The ability of the site to communicate with the customer in terms of openness, speed of response and quality of information will influence the site to address the need of the customers, who in turn will respond to it. Thus, the higher the degree of communication displayed by the banks site, the greater will be the influence on the customers trust. Ways to increase online communication by the sites include fast response, personalized message and real-time interactions (Geten and Straub, 2001). Opportunistic Behaviour: Opportunistic behaviour can be defined as self-interest seeking guile (Williamson, 1975). The integrity of the online banks and obligations depend on the extent of regulatory control, which is a major determinant of the customers trust in online banking environment (Lee and turban, 2001, main). Customers have low level of trust due to high risk of opportunistic behaviour by online banks and poor developed rules (Clay and Strauss, 2000, main). Online identities can be forged (Ba, 2001, main), sites can be counterfeit (bailey and Bakes, 1997, main). Because of the lack of adequate regulatory control customers believe that their personal information may be used without their consent during or after navigation (Li et al., 2001). Klang (2001) stated that customers first access banks interest and then judge its integrity. Thus, it can be seen that integrity of the online bank is very important in gaining the trust of the customers. 2.4 Technology Acceptance Model Organisations invest in Information Systems for many reasons. For example cutting costs, producing more at the same cost, improving quality of services and products (lederer et al., 1998 (CP)). Users attitude towards the acceptance of new Information System plays an important role in successful adoption of the information system (Venkatesh and Davis 1996 (CP)). The more accepting the new information system the user are, the more they are willing to accept changes in their practices (Succi and walter, 1999 (CP)). Thus, the usage of a system can be an indicator of information system success. If the user does not rely on the system their behaviour would become negative for the Information System. One of the most widely used model for studying Information System acceptance is Technology acceptance Model (TAM) which helps in determining the use of system. The TAM model is an information system that shows how the users accept and use a technology. The model reflects that when a user is give or provided with a new software package, a number of factor will influence their decisions. They are: 1. Perceived Usefulness: Fred Davis defines perceived usefulness is the extent to which a person believes that using a particular system would enhance their job performance. Finally perceived usefulness is influenced by ease of use and external variable, which could be training, documentation and user support. 2. Perceived Ease of Use: Davis defined this as a the extent to which a person believes that using a particular system would be free from effort (Davis 1989). According to Technology Acceptance Model (TAM) the two factors are very important in determining computer acceptance. TAM is an adoption of the TRA (Theory of Reasoned Action) which was developed by Ajzen and Fishbein. TAM was developed by Fred Davis (1986, 1989) to explain software adoption based on TRA. Theory of Reasoned Action (TRA) is based on the assumption that consumers behave rationally and they evaluate systematically all the available information. TRA also assumes that people take into account the effect of their actions ad based on this reasoning make decision to whether take action or not (Ajzen and Fishbein, 1980 (CP)). Individuals will use computers if they feel that there would be positive benefits associated with it. Technology Acceptance Model hypothesises that: The more the perceived usefulness of the technology the more is the adaptation. The more is the ease of use of technology, the more is the adoption. The lower the benefit of the innovation the less is the adoption. In addition to individual characteristics like age, gender, qualification and previous experience in adopting technology, there are some social factors. They are: 1. Apprehensiveness: it refers to the anxiety of using a new medium or technology (Rao, ). The adoption of the telephone in early years led to apprehensiveness. A firm would never risk by adopting indigenously developed technology as it involves cost and chances of failure are enormous (Rao, ). For example, bank employees are always worries about computerisation of data. 2. Intrinsic Motivation: It leads to activities where there is no reward for the work but the activity itself. Intrinsic motivation arises from people need to feel satisfied and competent in dealing with their environment. There is an inner motivation to learn. For example: in case of new recruits, learning for them is an investment. 3. Compatibility: it is the judgement of the decision makers to evaluate the compatibility of the new technology. The more the new technology is similar to the existing one, the higher is the confidence to learn the new technology. 4. Social pressure: Social norm have most significant affect on system usage. Norm is the most frequent occurring and observable for the members of a particular society. For certain products, the social message that the product conveys to its users is the only benefit that the adopters receive (Rao, ). 5. Enhanced Value: Apart from the benefits derived directly, there could be some benefits that are derived indirectly such as generations or enhancement of quality image. Such benefits can create extra value for the user. Therefore, adopting a new technology may not only be from the firms utilisation point of use but also the extra value added with the new technology. The more experience an adopter has, the better will be the understanding of a new technology. This will lead to the appreciation of the added value with the new technology by the user or the adopter. 6. Technology suppliers commitment: new technology teds to carry high risk. A good commitment from the supplier can help reduce the level of risk related with it. It can be done through providing adequate information to the user. Resource commitment from the supplier can help the adopter to accept the new technology. In this world when the technology is changing rapidly the buyer is worried about the life of the technology that he is adopting. This problem can be delt by the supplier by promising to upgrade their product or buy back of hardware and change of the software. 7. Adoption experience: adoption experience is the accumulated knowledge of the user and working relationship with the suppliers. Any previous experience with the technology helps the adopters to collect all the relevant information related to technology. The adopters know the needs and the requirements of the new technology and can understand the support required from the supplier of the technology. 2.5 Some other Information System Some other Information Systems are: Theory of Reasoned Action: Theory of reasoned Action (TRA) was developed by Martin Fishbein and Icek Ajzen (1975, 1980). Theory of reasoned action consists of three components: 1. Behaviour intention 2. Attitude 3. Subjective norm. Behaviour intention is a measure of ones intention to execute a specified behaviour. Attitude is defined as an individuals positive or negative feelings for behaviour (Warshaw, Bagozzi and Davis, 1989). Subjective norm is a persons perception of what people think that the individual should do. Subjective norm is a type of pressure. A persons participation in any behaviour is influenced strongly by people around them. In this theory persons behaviour consists of two factors: 1. Belief that certain behaviour would lead to some outcome. 2. An evaluation of the outcome of the behaviour. Thus, if an outcome is beneficial for the individual then he/she tends to participates in the behaviour (Mischigan State University, 2008). Theory of Planned Behaviour: The theory of planned behaviour (TPB) was proposed by Icek Ajzen. Theory of planned behaviour helps us to understand how we can change the behaviour of the people. TPB is an extension of Theory of Reasoned Action of Ajzen and Fishbein (1975, 1980). There are three considerations that guide human behaviour. 1. Behavioural belief: behavioural belief is an individuals belief about consequences of certain behaviour. 2. Normative Belief: It is the perception about certain behaviour which is influenced by the judgement of others. 3. Control Belief: Control beliefs are the belief that facilitate or impede the performance of behaviour. Behavioural Beliefs generates favourable or unfavourable attitude towards behaviour, normative belief results in social pressure and control beliefs gives rise to behavioural control. Thus, in combination attitude towards behaviour leads to the formation of behavioural intention. If the attitude is more favourable, the perceived control will be greater and the persons intention to perform the behaviour will be stronger (12 Manage, 2009). Task Technology fit Model: Task technology fit model was developed by Goodhue (1995), Goodhue ad Thompson (1995) at individual level. At group level it was developed by Zigrus and Buckland (1998). TTF model states that a good fit between technology, task and team can lead to better performance (Dennis et al, 2001, Goodhue, 2005, Zigrus and Buckland, 1998). In TTF Goodhue examines three factors: 1. Individual ability 2. Technology characteristic 3. Task requirement. He evaluates the influence of these three factors on performance and user evaluation of information technology system. Goodhue argues that TTF is the extent to technology functions, matches task requirements and individual abilities. Goodhue and Thompson (1995) developed a measure for TTF that consists of eight factors They are as follows: 1. Quality 2. Locatability 3. Authorization 4. Compatibility 5. Ease of use 6. Production timeliness 7. System reliability 8. Relationship with the users. Each factor is evaluated between two to ten questions with responses on seven point scale from strongly agree to strongly disagree. However TTF focuses only of fit between user and technology and task and technology. It ignores the interaction between user and task (Mehlan et al, 2006). Goodhue argues that user evaluation is a substitute of TTF and it is appropriate for both mandatory and voluntary user information technology system. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. Technology Acceptance Model 2 (TAM2) is the extension of TAM and it includes additional constructs like social influence process (Subjective norm, Voluntariness and Image) and cognitive instrumental process (job relevance, perceived ease of use, output quality). TAM2 reflects three interrelated social forces faced by an individual to adopt or reject a new technology. They are: Subjective norm, Voluntariness and image. Subjective norm can be defined as persons perception that most people who are important to him think he should or should not perform the behaviour in question (Fishbein and Ajzen, 1975, p.32). Subjective Norm is included as a direct determinant of behavioural intention in Theory of Reasoned Action (Fishbein and Ajzen, 1975). The reason for the direct effect of subjective norm is that people may choose behaviour even if they do not agree towards the behaviour or its consequences, but if one or more referent thinks that they should then they are influenced to do so. Voluntariness and compliance with social influence: mixed findings regarding subjective norm was discovered by Hartwick and Barki (1994). After separating the respondents into mandatory and voluntary usage, they found that the subjective norm had a great effect on mandatory but not on voluntary setting. Casual mechanism is referred as compliance. TAM 2 theorizes that the direct compliance based effect of subjective norm on intention, perceived usefulness and perceived ease of use will occur on mandatory but not on voluntary system usage setting (Venkatesh and Davis, 2000). Voluntariness as a moderating variable defined as the extent to which potential adopters perceive the adoption decision to be non-madatory (Agarwal and Prasad, 1997, Hartwick and Barki, 1994). If the users do not accept the information system the organisation will not be benefitted from the information system (Davis, 1993. Davis ad Venkatesh, 1996). The more willing to the information system users are the more willing they are to make changes in their practices and time to start using new information system (Succi and Watler, 1999). Usage of a particular system is an indicator of information system success and acceptance of computer. If the users do not trust the system and its information then their behaviour towards could be negative. Therefore, it is important to find out the reason why people use or do not use the information system. This information will help both the designer and the developers in their work (Mathesion, 1991). According to Technology Acceptance Model (TAM), the two factors, Perceived usefulness and perceived ease of use are of primary significance for computer acceptance. This is because if a user feels that using a particular information system will enhance his job performance and would require less effort, then only the user will use the information system. In case of online banking and Technology Acceptance Model, Perceived Usefulness is the degree to which individual feels that using online banking will enhance his/her performance and perceived ease of use refers to the degree to which an individual feels that using online banking would be free from effort. Thus online banking involving complex procedures or requires customers to learn new software will discourage people from using online baking. The case to TAM will arise only when people trust online banking and use it, TAM will be not used when people are not using online banking. TAM comes into play or use only when people use onli ne banking. Thus, this shows that trust is the centre to online banking and TAM and it is a basic foundation for the use of online baking and Technology Acceptance Model. Therefore, we hypothesise that as trust increases the use of online banking also increases. Hypothesis Stated in formal fashion, my study two five hypothesis. There is a positive relationship between ease of use and trust. There is a positive relationship between perceived ease of use and trust. 3. Research Methodology: 3.1 Research Design: The research design for this study investigates the factors that have an influence on customers acceptance of internet banking. I present an additional belief, trust and its dimensions to the Technology Acceptance Model to reflect the importance of trust in online banking environment. Online banking is of great use to the customers. It helps in saving time, cost, it can be used at anytime of the day irrespective of the location. All these benefits enhance the performance of the customers banking activity. A customer will therefore expect these services when he/she uses online banking. Trust is identified by three main antecedents. They are shared value, communication and opportunistic behaviour whereas Technology Acceptance Model is identified by two main characteristics like Perceived ease of use and Perceived usefulness. Verifying the TAM-Trust related hypothesis in the context of Online Banking will help us determine the importance of trust in Online Banking. Shared value is the extent to which the customers and bank share a common belief about what goal, policies are important or unimportant, right or wrong (Morgan ad Hunt, 1994). Based on the operational definition of Perceived usefulness, I assume that Perceived usefulness will help establish trust or shared value if the customers believe that online banking is useful. (Suh, Han). H1. Perceived Usefulness has a positive impact on Shared Value of the customer. Trust id negotiated through openness in communication. Communication has various variables like speed of response, quality of information and openness (Mukherjee and Nath). A customer will trust online banking only when his/her communication with the bank is fast, open and useful. Slow communication and low response rate from the bank will discourage people from trusting the bank. Thus, more the communication will be useful and open to the customer the greater will be the trust between the customer and the bank. H2. There is a positive relationship between communication and Perceived Usefulness in building trust. Opportunistic behaviour is conceptualised as regulatory control and information asymmetry. Due to high risk of opportunistic behaviour by online banks and poor developed rules and regulations, customers have low level of trust in online banking (Mukherjee and Nath). Thus, less opportunistic behaviour showed by the bank will increase the level of trust and usefulness from the customers point of view. H3. There is a negative relationship between Opportunistic Behaviour and Perceived Usefulness. Perceived ease of use is the extent to which using of a system would be free from effort (Davis, 1989). If the terms and conditions of the shared value of the bank is easy and free from effort then it will enhance trust and encourage customer to use online banking. H4. There is a positive relationship between Perceived ease of use and shared value. The customers trust also depends upon his/her communication with the bank. Communication is directly related to Perceived ease of use. If the communication of the customer with the bank is effort free and comfortable, customers would be encouraged to use online banking. So we hypothesise H5. There is a positive relationship between communication and Perceived ease of use. H1 H4 H2 H5 H3 H6 3.2 Research Method This chapter covers the operational description of the research explaining the methodology strategy used in this study. In order to achieve the research objectives, the most appropriate method to collect the data. Data is collected both by primary and secondary research. The reasons for using these methods and how the overall study was conducted will be explained in this section. The methodology used has some limitations which will be discussed at the end of this chapter. Research is a systematic study on a particular matter employing facts investigation and data collection (Collins, 1989). Research can also be defined as a systematic and methodical process of enquiry and investigation with a view of increasing knowledge (Collins and Hussey, 2009). The objectives of the research can be summarized as follows: To provide solution to the problem. To explore and analyse more general issues. To generate new knowledge To explain new phenomenon. (Collins and Hussey, 2009) Research is conducted using two main strategies. They are Qualitative and Quantitative. (Bryman and Bell, 2008). Quantitative method is a phenomenon which concentrates on phenomena of measurement. In this the data can be shown in mathematical format or in statistical software by producing different charts and graphs. In simple words quantitative method can be measured. 3.2.1 Choosing Quantitative method This research mainly used quantitative method because quantitative method can be construed as a research strategy that emphasizes quantification in the collection and analysis of the data and also because: It involves a deductive approach between theory and research in which the accent is placed on the testing of theories. It involves a view a social reality as an external, objective reality. It incorporated the practices and norms of the natural scientific model and of positivism in particular (Bryman and Bell, 2008). Quantitative Data Analysis There are two types of quantitative data analysis. 1. Descriptive analysis 2. Inferential analysis Descriptive data analysis is also called as exploratory data analysis. It is concerned with describing data, it is also useful for summarising data and presenting it in tables, charts, graphs and other diagrammatic forms which enables us to comprehend pattern and relationships which are not apparent in raw data. Graphical presentation does not only present data in more compact form but the form that positively aids hypothesis confirmation (Hussey and Hussey, 1997). The four main groups of techniques which can be used are: presenting frequencies, measuring location, measuring dispersion ad measuring change. Inferential data analysis is also known as confirmatory data analysis. It involves using quantitative data collected from a sample to draw conclusions about a complete population (Hussey and Hussey, 1997). Four groups of inferential statistics which are used while conducting confirmatory data analysis are: estimating form samples, measuring associations, measuring difference, forecasting. This study will use descriptive data analysis to study the data collected from primary source. The advantages of descriptive data analysis are: It helps examine the tendencies, spread, normality and reliability of the data set. Descriptive statistics can be rendered both graphically and numerically. Descriptive statistics includes useful techniques for summarizing data in visual form. Descriptive data analysis is much easier to work with, interpret and discuss the raw data. 3.2.2 Primary Data Primary Data Collection: Primary Data is the information that is collected first hand by the author (William, 2003). The data is original and is used for the first time in the research. There are many methods of collecting Primary data for example interview, questionnaire and observations. This research adopted self-completion questionnaire. It is sometimes referred to as self-administered questionnaire. In self-completion questionnaire the respondents answer the question by completing the questions themselves (Bryman and Bell, 2008). Self-completion questionnaire can be done in several forms. One of the most used methods is mail or postal questionnaire. In this the questionnaire is sent to the respondents through the post, who in turn after filling the questionnaire is asked to return it by post. In many ways self-completion questionnaire and interview are similar methods of business research. The basic difference between them is that there is no interviewer to ask the question, the respondent must read the questions and answer themselves (Bryman and Bell, 2008). As there are no interviewer to ask the question must be simple and easy to follow. As compared to interview the self-completion questionnaire should be: The questionnaire should have fewer open questions and more closed questions because they are easier to answer. Questionnaire should have easy-to-follow to reduce the risk that the respondents will fail to answer (Bryman and Bell, 2008). 3.2.3 Why Questionnaire In this research the author has use questionnaire to collect primary data. Some advantages of self-completion questionnaire over interview are: 1. It is cheaper to Administer: The cheapness of the self-completion questionnaire is especially advantageous if you have a sample that is geographically widely dispersed (Bryman and Bell, 2008). Interviewing can be expensive. The postal questionnaire will be much cheaper because interviewing involves a lot of time as conducting personal interview is a long process. Thus, the postal questionnaire enjoys cost advantage. 2. Quicker to administer: questionnaire can be sent out by post or distributed in large numbers at a same time but in interviews conducting personal interview takes a lot of time. Many questionnaires can be sent out by post in one batch. Also, it is very important to note that all the sent questionnaire do no t come back immediately ad they may take several week to be returned. There may be a need to send a follow up letter to those who fail to return the questionnaire. 3. No variability of the interviewer: Self-completion questionnaire do not suffer from the problem of question being asked in different ways by the interviewer. 4. Convenience for respondents: Completing a questionnaire is convenient for respondents because they can fill the questionnaire whenever they want and at the speed that they want. 3.3 Sample Selecting a sample is a fundamental element of a positivist study. A sample is made up of some members of a population. A population may refer to a body of people under consideration for research purpose. (Hussey and Hussey, 1997). A good sample is one in which the result obtained for a sample can be taken as true for the whole population. A sample technique is broadly classified in two categories: probability and no probability sampling technique. In probability sampling technique sample is selected randomly from a sampling framework. In a non probability a sample is drawn based on the personal judgement of the researcher (Malhotra, 2007) This study has used non probability sampling technique to collect data because of the restriction of time, unavailability of sample framework of online banking users in India. The study conducted online surveys to collect data. For online surveys a snowball sampling technique was to distribute questionnaire online. An initial group of 20 respondents were identified from personal sources. These respondents were asked to suggest people and questionnaire was distributed among them. The final valid respondent sample to the structured questionnaire consisted of 120 internet surfers in India. The respondents chosen were students, professionals, self-employed and housewives. 3.4 Modes of Analysis Responses to the quantitative survey questionnaire were considered and discussed in the light of the existing literature. In order to measure the quantitative result of the questionnaire, it was designed to integrate a five point likert scale (Saunders et al, 2006). For example a question was designed to ask if online banking makes it easier for them to utilize banking services. The respondents were supposed to give answers o the 1-5 rating scales where: 1= strongly disagree, 2= disagree, 3=neutral, 4=agree, 5=strongly agree. Answering strongly disagree or disagree would suggest that online banking did not make banking services easy for the users whilst choosing strongly agree or agree would indicate contrary. However, a disadvantage of using this method is that the respondents to be in a positive light (Eysenck and Flanagan, 2002), may have been subject to social desirability bias (Baker and Foy, 2008) by avoiding selecting the extreme options. Reliability and Validity A research is evaluated using two most prominent criteria namely reliability and validity from a methodological point of view. Reliability refers to a consistency for a measure of a concept in a piece of research (Finn et al., 2000). Reliability has greater importance in a quantitative research. For example: if you ask the same question to a respondent repeatedly, the answer would be same (Bryman and Bell, 2008). According to Bryman and Bell (2008, p.165) Validity refers to the issue of whether or not an indicator that is desired to gauge a concept really measures that concept. Validity is the most important criterion of research. It is also concerned with the integrity of the conclusion that are generated from research. There are different types of validity. There are mentioned below: Measurement Validity: It is also known as Construct Validity. Measurement validity primarily applies to quantitative research and to the search for measures of social scientific concept. It is generally related to whether or not a measure that is desired of a concept really does reflect the concept that it is supposed to be denoting. Measurement validity is very much related to reliability. If a measure of a concept is unstable, fluctuates then it is unreliable. It cannot provide a valid measure of the concept (Bryman and Bell, 2008). Internal Validity: It is concerned with a question of whether a conclusion that incorporates a casual relationship between two or more variable holds water. For example: In our study shared value causes trust, can we be sure that it is only shared value that is responsible for causing trust and nothing else. Thus, Internal Validity raises question: how confident can we be that independent variable is responsible for the change identified in dependent variable. External Validity: External Validity refers to the question of whether the result of a study can be generalised beyond specific research context. How people or organisations are selected to participate in research becomes very crucial in this issue. It is because of External Validity that the quantitative researchers are so keen to generate samples. Ecological Validity: The issue of Ecological Validity relates to the naturalness of research approach and has considerable relevance to quantitative research. The criterion is concerned whether social scientific findings are applicable to peoples every day, natural social setting. Thus, business research may sometime produce findings that are technically valid but little to do with the happenings in the peoples everyday life. Furthermore, result deriving from a study using questionnaire the unnaturalness of the fact of having to answer a questionnaire may mean that the findings have limited Ecological Validity, but the questionnaire may have measurement validity and reasonable level of internal validity. (Bryman and Bell, 2008).

Sunday, May 17, 2020

Financial Manager Career Data Analysis Essay - 588 Words

As the economy expands and employment opportunities increase, the need for workers with financial expertise will go up. I will enter the workforce at an excellent time to pursue a career as a financial manager. The information I have acquired concerning this field including opportunities, salary, and working conditions will justify my decision to obtain a position as a financial manager for a major corporation. The opportunities available to someone with a degree in finance are limited to only a few facets of the business world, but according to Job Outlook 2004, a finance degree is one of the top ten degrees in highest demand. Employers are starting to seek graduates with a master’s degree as well as a bachelor’s degree, which makes†¦show more content†¦Despite long hours and impressive workloads, employees enjoy a comfortable work atmosphere with accommodating offices that have access to state-of-the-art computer systems and other technology. Working long hours is required of most jobs but the compensation offered to a financial manager is worth the extended time at work to most employees. The Occupational Outlook Handbook states that the median annual earning of financial managers was $73,340 in 2002. An entry-level associate can expect to earn at least $39,120, which is in the lowest 10 percent of this field. Below is a table that shows the salaries of different level associates in different career capacities as financial managers: Total Compensation of Selected Financial Manager Positions Vice President of Financenbsp;nbsp;nbsp;nbsp;nbsp;$183,500 Treasurernbsp;nbsp;nbsp;nbsp;nbsp;$150,600 Directornbsp;nbsp;nbsp;nbsp;nbsp;$113,600 Managernbsp;nbsp;nbsp;nbsp;nbsp;$84,500 Cash Managernbsp;nbsp;nbsp;nbsp;nbsp;$64,700 Employment opportunities are abundant nationwide at corporations located in major cities, and with bank branches in smaller cities. The Occupational Outlook Handbook says that 1 in 10 financial managers work as bank managers inside the banking industry. Another interesting statistic listed is that insurance and financial establishments employ 1 in 4 financial managers. This includes savings institutions, finance companies, creditShow MoreRelatedWhy Are Information Systems So Essential For Running And Managing A Business Today?1458 Words   |  6 Pagesfor running and managing a business today? An organization’s information system is capable of very important tasks and it is important for any business to exploit its capabilities. Information systems are important to businesses because they process data from the businesses’ input to generate information that is crucial for managing operations. The following points will explain why information systems are important to businesses: †¢ Operational Excellence: Higher profitability can be achieved throughRead MoreEssay On The Most Valuable Things Learned1018 Words   |  5 PagesSome of the most profitable things for me is that in learning about utilization and financial statements is to consider the usage for fiscal explanations to examine and getting an understanding of how the firm incorporates those offers data over Comprehension of those executions of the firm. The financial clear information very detailed analysis of an idea that will be critical similarly as it gives serious data of the shareholders in taking such choices. Furthermore, in discovering that the economyRead MoreResearch And Analysis Of Hr Recruiting Event For A Financial Analyst Position1709 Words   |  7 PagesUnited States University: MGT504 HR Leadership 10/04/2015 Professor Jennifer Newmann Executive Summary This paper provides details about the research and analysis of HR recruiting event for a financial analyst position in a credit card company named Discover Financial Services in their headquarter Riverwoods, Illinois. Discover Financial Services is a leading firm, whose main product Discover card is one of the major credit cards in US market. This paper will first provide an introduction aboutRead MoreManagement1097 Words   |  5 PagesFor many of us, finding a career that we deem fun and long-term is in itself a long journey. But having a successful career in life is not just for the rich and famous, its also for the average person. We as humans are prone to look at successful individuals like Oprah or Bill Gates and assume that somehow they became wealthy and innovative overnight, but it truly took many years, time, effort, and perseverance. Choosing a career is an involved process that is based on a number of things, includingRead MoreCase Study of Store24 (a): Managing Employee Retention Essay1623 Words   |  7 Pagestenure, and site location factors of 75 stores. Based on the data, we recommend that Store24 researches ways to increase employee tenure, more specifically manager tenure. Holding store location factors constant, manager tenure has the greatest impact on profits of Store24 stores. Problem and Matching Objectives: In defining the problem, we need to determine whether employee drives performance and how well employee tenure explains financial performance compared to site location factors. If we canRead MoreGenrays Hris Implementation : Project Charter1724 Words   |  7 PagesPurpose 3 Description 3 Objective 3 Success Criteria or Expected Benefits 4 Funding 5 Major Deliverables 5 Acceptance Criteria 6 Milestone Schedule 6 Approval Requirements 7 Project Manager 7 Authorized by 7 â€Æ' Project Title GenRays HRIS Implementation Purpose Based on GenRays better than expected success with the financial system implementation, they have determined to utilize the cost savings and continue to invest in process improvement and internal tool integration across the company. The purposeRead MoreWho Is A Fraud Risk Analyst For Best Western International1297 Words   |  6 Pagesuncover new sources of information have provided me with a keen eye to leverage the data in different ways. Therefore, I have chosen to gather information from multiple sources to analyze the similarities and differences between a career as a Marketing Manager and Internal Auditor, in order to enhance my working familiarity with resource material to develop information literacy skills for future endeavors. A Marketing Manager is in charge of planning, directing and coordinating marketing policies and programsRead MoreAnalyzing Career Choices1340 Words   |  5 PagesAnalyze career choices choosing Introduction Career choice can be very difficult to make especially when faced with a decision to choice between two attractive job offers (Clinton Van der Merwe2006). Certainly, each of these jobs will have its positive and negatives aspects. Thus, how would you make an informed choice on the best offer? This requires a good decision-making system. This report presents a way such decision can be carried out. Accountant and auditor job Pay and compensation Read MoreEstate Career Options : Property Appraiser, Property Manager, And Real Estate Analyst Essay1485 Words   |  6 Pagesfocuses on three real estate career options: property appraiser, property manager, and real estate analyst. These career options will be analyzed in detail regarding the responsibilities that each entails. Additionally, the nature of the work will be discussed along with the personal strengths and characteristics associated with each career option. This will provide a better context when conducting the comparison and contras. An explanation will be given about which career option works best for my personalityRead MoreCareer in Finance and Mathematics1137 Words   |  5 PagesCareer in Finance and Mathematics An B. Nguyen Grantham University BA550, Finance October 27, 2015 Abstract There is many job opportunity for individual with the career in finance or mathematics background. According to Careers-in-Finance.com, the lowest entry level related to finance start from $35K-$50K annually in small firms and can reach as high as $260K-$390K for large firms. The income can variable depended on the level of education and experiences. Around the finance corporate,

Wednesday, May 6, 2020

American History Racial Profiling and Bias in The Media

Since the beginning of American history, the media have played a massive role in how people perceive certain viewpoints. The media comes in all different shapes, whether it is propaganda, a commercial, advertisements and even newspaper articles can influence and individual minds. It can be even used to change one’s opinion on the way they may think of a particular race. Still today the media influences our mind, however many believe due to media bias and racial profiling will affect how â€Å"fair† their trial will be. In fact in today’s society, citizens in the United States are unable to gain a fair trial due to racial profiling, and bias in the media. Since early in American history, those who were not white were perceived to be†¦show more content†¦Where’s the benefit of doubt for him? Racial profiling also plays a huge role in how the jury votes against certain cases. â€Å"The Supreme Court interpretation of that provision gives the police a wide direction to follow, stop, question, frisk and employ excessive force against African American and Latino’s who have shown no indication of wrong doing†(Racial Profiling Lives On 1). Police officers are able to stop those who seem â€Å"suspicious† and do whatever they deem fit in order to prove whether a person is guilty or not. How can people believe they are not being racially profiled against if they are stopped because of their race? â€Å"In the past decade, Los Angelos, New York, Chicago, Miami and other big and small cities have been repeatedly been called on the carpet for alleged racial profiling†¦Bush blasted racial profiling† (Racial Profiling Exist 2). Bush wanted to end racial profiling in the US, but it still has yet to be successful. The media today is something that is used more than anything else by teens to obtain information about the world. â€Å"Social media in this day and age cannot be ignored; it is now a critical part of presidential politics, it has been part of the revolutions in the Middle East and its going to be an unavoidable part of high-profile legal cases; just as traditional media continue to be† (Hochberg 1). The media have reached the peak of influence since the beginning;Show MoreRelatedThe Essence Of Racial Profiling Essay1608 Words   |  7 PagesThe Essence of Racial Profiling Grown up in a traditional family, I have been deeply influenced by the Confucianism since I was a child. Confucianism was created by Confucius, who devoted his life in delivering his concepts of filial piety, equality, harmony, and progress. When I was a kid, I was taught to follow the Confucianism. I learned that everyone in the world is equal; building a mutual respect and harmonious relationship with others is vital to human beings and the development of societyRead MoreRacism And Prejudice : Racial Profiling1078 Words   |  5 Pagesassure us that history once again repeat itself with no difference. Americans has become divided to an expectation of what an American is. It seems that there has not been any solution to racial profiling. Unconsciously criminal’s assumptions are being beaten, violated, and murder over the decades. According to Thandisiwe Chimurenga, NO DOUBT THE MURDER OF OSCAR GRANTS illustrates the importance of a white supremacist system that has been desi gned to oppress people by racial profiling by color throughRead MoreNegative Effects Of Racial Profiling1573 Words   |  7 Pagespaper will give a highly detailed view of the effects that racial profiling has on juvenile offenders while focusing on minorities. It will also illustrate researched statistics on diverse ethnic groups, environmental backgrounds, and how they correlate with the fear that stems from racial profiling. Details will be provided on how each ethnic group is directly affected by racial profiling, how stop and frisk laws are unequivocally bias towards certain minority groups, and how police frequent povertyRead MoreDriving While Black, Abbreviated As Dwb, Is A Phrase1031 Words   |  5 Pageswhile black, abbreviated as DWB, is a phrase in American English that refers to the racial profiling of African American drivers. The phrase implies that a motorist might be pulled over by a police officer, questioned, and searched, simply because of a racial bias.Racism a nd Racial profiling is everywhere in homes, Religion, and even states like Mississippi, Alabama, Texas, Tennessee, Louisiana, and Illinois. Imagine you re an African American male or female driving down a street minding yourRead MoreRacial Profiling And The Civil Rights Movement1065 Words   |  5 PagesWhen thinking about racism, it feels like it is a thing of the past, but it’s not. There are numerous people who are racist in law enforcement and that is demonstrated through racial profiling. Racial profiling still exists today and unfortunately happens frequently. In 2013, an unarmed black male, Trayvon Martin, is shot and killed by an officer. In 2014, Michael Brown, who is also a black male is shot and killed by another officer. Also, many black and Hispanic people are racially profiled andRead MoreBlack Lives Matter Is An International Activist Movement1693 Words   |  7 Pagesactivist movement, originating in the African-American community that campaigns against violence towards black people. â€Å"Black lives matter† became a rallying cry of a new chapter in the long black freedom struggle. Its unique campaign contributes beyond extrajudicial killings of Blacks by policemen and vigilantes. It all started year 2013, after a white/hispanic male, â€Å" George Zimmermanâ€Å" was found not guilty of the fatal murder of african american teenager Trayvon Martin. The movement grew evenRead MoreRacial Profiling : A Strong History1587 Words   |  7 PagesRacial profiling has a strong history in these United States. First, what is racial profiling? Basically, racial profiling is an assumption about something solely based on a person’s race. It may also be a filter through one’s eye. For example, when a police officer decides to only stop African Americans, he is racially profiling; if he decides to exclude all African Americans from any stops he conducts, he is also racially profiling. Racial profiling is a form of discr imination people generallyRead MoreRacism And The Criminal Justice System1739 Words   |  7 Pagesas there are usually two sides that we have to consider: reality and media portrayals. The reality side of situations is always there at the time, but it is so subtly hidden from society that nobody understands it unless they witness it firsthand and with the media spreading filtered information, it becomes even harder for us to identify the key issue; this is especially the case when dealing with the police and racial profiling. If you turn on the news and flip to a channel where it is reportingRead MoreRacial Profiling And The American Civil Liberties Union998 Words   |  4 PagesRacial profiling† can hold a variety of meanings. As defined by the American Civil Liberties Union, however, racial profiling is the discriminatory practice by law enforcement officials of targeting individuals for suspicion of crime based on the individual s race, ethnicity, religion or national or igin (â€Å"Racial Profiling†). Every day, blacks are stopped much more frequently for aimless searches and minor infractions than their white counterparts. Several African Americans share experiences likeRead MoreA Color Problem in a Post Racial Nation Essay1637 Words   |  7 Pagesin America anymore. One might assume that this statement is a plausible one, given the fact that we have a male â€Å"African American† president, and America is now considered to be a â€Å"Post-Racial Nation† (Rush Limbaugh, 2010), where skin color is no longer an inhibiting factor. The truth of the matter is that race has most certainly played a significant factor in America’s history since the early 16th century and through to the 21st century. â€Å"Race† is a good predictor of who has power, owns land, receives

Analysis of Leaders in Innovation free essay sample

The ability to be creative and think outside of the box is fundamental in today’s more challenging and competitive business landscape. Organizations today are looking for business professionals who have the ability to lead through innovation. Innovation is the application of better solutions that meet new requirements, unarticulated needs, or existing market needs. This is accomplished through more effective products, processes, services, technologies, or ideas that are readily available to markets, governments, and society. In order for organizations to stay fresh and up to date they need individuals who are able to innovate and inspire new products or ideas. CEO of HCL Technologies, Vineet Nayar, is most notably known for his approach to leading innovation and transforming his at-risk IT services company into a global leader. By examining Nayars innovation model, and that of other leaders like him, we can learn more about the skills and behaviors of such leaders and how they prepare their organizations to be more innovative. In this essay, the author will analyze research studies conducted on leaders of innovation and expound on the discovery skills of successful leaders in innovation. In the article, Strategic leadership for the 21st Century, the premise of the article is based on the notion that the 21st century was predicted by scholars to bring a highly competitive and challenging landscape in the business community. Scholars and practitioners alike argued that managers would be required to think creatively and be more innovative in developing a vision for their organizations in order to survive the changing and more challenging competitive landscape. The first decade of the 21st century was one of significant turbulence in American history. The key to thriving in the business community during this triumphant period in America’s history and even now today, is for individuals in the business community to take initiative and use their inherent capability to think creatively and be innovators in their field. Hitt et al. (1998) and Ireland and Hitt (1999) described the capabilities needed for effective strategic leadership in the new competitive landscape expected for the 21st century; all of the following traits were exhibited by Nayar at HCL Technologies. They argued that effective strategic leaders had to: (1) develop and communicate a vision, (2) build dynamic core competencies, (3) emphasize and effectively use human capital, (4) invest in the development of new technologies, (5) engage in valuable strategies, (6) build and maintain an effective organizational culture, (7) develop and implement balanced controls, and (8) engage in ethical practices (Hitt, Haynes and Serpa, 2010). The five discovery skills that comprise an innovator’s DNA are associating, questioning, observing, networking and experimenting (Dyer, Gregersen Christensen, 2011). A leader who is supporting innovation within an organization should inspire team members to develop these five discovery skills. Society’s general consensus is that the ability to think creatively and be a leader through innovation is genetic and one must be born with the gift. Innovators are supposedly right-brained, meaning that they are genetically endowed with creative abilities. Most of the population is left-brained and more logical, linear thinking individuals. Though everyone may not have the natural ability to think outside of the box, everyone has some capacity for creativity in terms of how they proceed in their business practices. In the article, â€Å"How I did it: A Maverick CEO Explains How He Persuaded His Team to Leap into the Future,† CEO of HCL Technologies, Vineet Nayar, explains the aforementioned title. Nayar had to use innovative thinking to persuade other top dogs in his company that HCL Technologies needed to make strategic changes in their business practices in order to better position the organization for success in the future. Nayer took persistent action in transforming HCL Technologies through innovative thinking and he followed four of the discovery skills associated with innovative thinking that is outlined in The Innovator’s DNA textbook. Specifically, innovators engage the following behavioral skills more frequently: Associating, Questioning, Observing, Networking, and Experimenting. In the article by Nayer, Nayer exhibited all of these discovery skills as an innovator in his organization. Nayar travelled worldwide to visit different offices in his company. He met with senior managers in small groups and at larger gatherings discussing the issues that he saw needed to be fixed within the company. Nayar also met with customers who gave him subsidiary feedback which helped him to better create an action plan to innovatively transform his company. In July 2005, Nayar convened a meeting with his top 100 managers in order to collaboratively develop a strategy to reinvent their company. Nayar proposed that HCL transform itself from an IT services vendor into an end-to-end global IT service partner that could compete against the likes of IMB, Accenture, and EDS. At first, everyone was not on board with Nayar’s strategy, but after three days of intense debate, Nayar was successful in swaying company top dogs to go along with his innovative strategy (Nayar, 2010). Nayar began holding informal meetings with frontline employees, engaging them in discussions about the kind of company they wanted to work for and how they saw their jobs. These meetings became more formal in 2006, with a series of companywide meetings called â€Å"Directions. † These meetings still continue within the company today in order to promote harmonious work relations (Nayar, 2010). Leading through innovation requires one to be both a leader and an innovator in their field, both which Nayar successfully executed as CEO at his company. The meaning of innovation has been discussed earlier in this essay. Now, for one to be recognized as a leader they must realize first, to lead involves influencing others. Second, where there are leaders there are followers. Third, leaders seem to come to the fore when there is a crisis or special problem. In other words, they often become visible when an innovative response is needed. Fourth, leaders are people who have a clear idea of what they want to achieve and why. Thus, leaders are people who are able to think and act creatively in non-routine situations – and who set out to influence the actions, beliefs, and feelings of others (Doyle, Smith 2001). In The Innovator’s DNA textbook, Dyer, Gregersen, and Christensen highlight the five aforementioned discovery skills for successful innovation: associating, questioning, observing, networking, and experimenting. They also highlight four delivery or execution skills which include analyzing, planning, detail-oriented implementing, and self-disciplined executing. Dyer, Gregersen, and Christensen researched and tested the assertion that innovative executives have a different set of skills than typical executives; the researchers used the innovator’s DNA assessment to measure the percentile rank of a sample of high profile innovative entrepreneurs on both the five discovery skills and the four delivery skills. The researchers averaged their percentile rank scores across the five discovery skills to get an overall percentile rank, and then did the same thing across the four delivery skills to get an overall percentile rank. The researchers refer to the overall percentile rank across the five discovery skills as the â€Å"discovery quotient† or DQ. While intellectual quotient (or IQ) tests are designed to measure general intelligence and emotional quotient (or EQ) assessments measure emotional intelligence (ability to identify, assess, and control the emotions of ourselves and others), discovery quotient (DQ) is designed to measure our ability to discover ideas for new ventures, products, and processes. The conducted research analysis showed that the high-profile innovative entrepreneurs scored in the eighty-eighth percentile on discovery skills, but only scored in the fifty-sixth percentile on delivery skills. Essentially being just average at execution. The same analysis was then conducted for a sample of non-founder CEOs (executives who had never started a new business). Which concurred that most senior executives in large organizations were the mirror image of innovative entrepreneurs: they scored around the eightieth percentile on delivery skills, while scoring only above average on discovery skills (sixty-second percentile). In essence, they are selected primarily for their execution skills. This focus on execution is even more pronounced in business unit managers and functional managers, who are worse at discovery than typical CEOs. This data shows that innovative organizations are led by individuals with a very high DQ. It also shows that even within an average organization, discovery skills tend to distinguish those who make it to the highest levels of the organization (Dyer, Gregersen, Christensen, 2011). In conclusion, Vineet Nayar was able to transform his company by executing the discovery skills of associating, observing, questioning, experimenting, and networking. The key factors implemented by Nayar in the transformation of HCL Technologies were (1) talking with people and facing the truth and acknowledging that there is an issue that requires addressing. (2) Finding ways to build a culture of trust so that people will entertain the plan for change. (3) Making support functions and executives accountable to frontline employees versus the other way around. (4) Lastly, transfer the ownership of change from the office of the CEO to the employees and allow the CEO to ask as many questions as the employee answers.